Facebook security

Facebook users around the world have reported the return of the network’s longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.

Two-thirds of young people first learn about major news events via Facebook - but as cybercriminals cash in with hoax stories and links, it can be difficult to tell 'real' content from fake. Our tips can help.

Gamers have reported losing millions of dollars to hackers running customised 'Grand Theft Auto V' software which allows them to steal weapons, loot money, and even make people blow up in their own apartments.

A young man who got an email from Facebook ‘identifying’ him via Facebook tag in a series of photographs which turned out to be his mother as a young woman, says the incident “opens the door to larger and more difficult questions.”

Cheating network Ashley Madison has been hacked, compromising the private details of the service's owners and 37 million users. The site, which has the slogan “Life is short. Have an affair.”, was attacked by a group calling itself the Impact Team, which claims to have gained complete access to the company’s databases – including user names, addresses and profiles, as well as company documents, emails and more.

On December 23rd, 2015, around half of the homes in the Ivano-Frankivsk region in Ukraine (population around 1.4 million) were left without electricity for a few hours. According to the Ukrainian news media outlet TSN, the cause of the power outage was a “hacker attack” utilizing a “virus”.

To bring more clarity to the murky waters of post-truth marketing, we at WeLiveSecurity have decided to release a series of short articles focused on the currents state of AI, all the ins and outs of ML, and ML as it affects cybersecurity.

Google Play porn clicker, described as a large-scale campaign, belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

The 2016 attack on Ukraine’s power grid that deprived part of its capital, Kiev, of power for an hour was caused by a cyberattack. ESET researchers have since analyzed samples of malware, detected by ESET as Win32/Industroyer, capable of performing exactly that type of attack.

Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.